A critical analysis of Zero Trust Architecture (ZTA)

EB Fernandez, A Brazhuk - Computer Standards & Interfaces, 2024 - Elsevier
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …

Small changes, big changes: an updated view on the android permission system

Y Zhauniarovich, O Gadyatskaya - … 2016, Paris, France, September 19-21 …, 2016 - Springer
Since the appearance of Android, its permission system was central to many studies of
Android security. For a long time, the description of the architecture provided by Enck et al. in …

A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges

B Patel, PS Mann - Security and Privacy, 2024 - Wiley Online Library
Modern time largely rely on mobile gadgets as a means of communication, and
entertainment. These gadgets now plays a vital role in forensic analysis and criminal …

Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness

M Park, J Han, H Oh, K Lee - Wireless Communications and …, 2019 - Wiley Online Library
As smartphones such as mobile devices become popular, malicious attackers are choosing
them as targets. The risk of attack is steadily increasing as most people store various …

Evaluation of resource-based app repackaging detection in android

O Gadyatskaya, AL Lezza, Y Zhauniarovich - Secure IT Systems: 21st …, 2016 - Springer
Android app repackaging threatens the health of application markets, as repackaged apps,
besides stealing revenue for honest developers, are also a source of malware distribution …

Comparative analysis of different Operating systems for Raspberry Pi in terms of scheduling, synchronization, and memory management

U Saeed, MA Khuhro, M Waqas… - … Research Journal Of …, 2022 - search.informit.org
Deep learning, big data, and the internet of things (IoT) have changed the world entirely. As
an embedded computer, Raspberry Pi is playing a dynamic and prominent role in the era of …

[PDF][PDF] A Lightweight Attribute-Based Access Control System for IoT.

S Monir - 2016 - harvest.usask.ca
The evolution of the Internet of things (IoT) has made a significant impact on our daily and
professional life. Home and office automation are now even easier with the implementation …

[PDF][PDF] 可穿戴技术的发展

颜延, 邹浩, 周林, 袁婵, 王磊 - **生物医学工程学报, 2015 - cjbme.csbme.org
从可穿戴技术的发展现状出发, 讨论可穿戴技术的内涵与外延, 回顾可穿戴技术发展的技术渊源
与发展历史; 从通信技术, 芯片技术, 传感器, 柔性原件等几个方面, 阐述可穿戴设备的关键技术; …

Analysis of tizen security model and ways of bypassing it on smart tv platform

M Majchrowicz, P Duch - Applied Sciences, 2021 - mdpi.com
The smart TV market is growing at an ever faster pace every year. Smart TVs are equipped
with many advanced functions, allow users to search, chat, browse, share, update, and …

A phase of deleted file recovery for digital forensics research in Tizen

S Eo, W Jo, S Lee, T Shon - 2015 5th International Conference …, 2015 - ieeexplore.ieee.org
Digital Forensics, not only for the computers of suspect, needs to collect the various digital
evidences especially in many different kinds of mobile devices and operating systems …